Sciweavers

1583 search results - page 148 / 317
» Probabilistic User Behavior Models
Sort
View
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
13 years 3 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran
PERCOM
2006
ACM
14 years 7 months ago
Developing a Model for Trust Management in Pervasive Devices
Pervasive devices interacting in open and dynamic spaces with each others require a mechanism that allows them acting autonomously in a secure way and protecting their resources. ...
Andrés Marín López, Daniel Di...
SPIRE
2010
Springer
13 years 6 months ago
Hypergeometric Language Model and Zipf-Like Scoring Function for Web Document Similarity Retrieval
The retrieval of similar documents in the Web from a given document is different in many aspects from information retrieval based on queries generated by regular search engine use...
Felipe Bravo-Marquez, Gaston L'Huillier, Sebasti&a...
PERCOM
2009
ACM
14 years 2 months ago
Markov Chain Existence and Hidden Markov Models in Spectrum Sensing
—The primary function of a cognitive radio is to detect idle frequencies or sub-bands, not used by the primary users (PUs), and allocate these frequencies to secondary users. The...
Chittabrata Ghosh, Carlos de M. Cordeiro, Dharma P...
ICCV
2005
IEEE
14 years 10 months ago
Detecting Irregularities in Images and in Video
We address the problem of detecting irregularities in visual data, e.g., detecting suspicious behaviors in video sequences, or identifying salient patterns in images. The term &qu...
Oren Boiman, Michal Irani